• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Survey on Deep Learning Approaches for Detection of Email Security Threat

    2023-12-12 15:49:54MozamelSaeedandZaherAlAghbari
    Computers Materials&Continua 2023年10期

    Mozamel M.Saeed and Zaher Al Aghbari

    1Department of Computer Science,Prince Sattam bin Abdulaziz University,Al Kharj,11912,Saudi Arabia

    2Department of Computer Science,University of Sharjah,Sharjah,27272,United Arab Emirates

    ABSTRACT Emailing is among the cheapest and most easily accessible platforms,and covers every idea of the present century like banking,personal login database,academic information,invitation,marketing,advertisement,social engineering,model creation on cyber-based technologies,etc.The uncontrolled development and easy access to the internet are the reasons for the increased insecurity in email communication.Therefore,this review paper aims to investigate deep learning approaches for detecting the threats associated with e-mail security.This study compiles the literature related to the deep learning methodologies,which are applicable for providing safety in the field of cyber security of email in different organizations.Relevant data were extracted from different research depositories.The paper discusses various solutions for handling these threats.Different challenges and issues are also investigated for e-mail security threats including social engineering,malware,spam,and phishing in the existing solutions to identify the core current problem and set the road for future studies.The review analysis showed that communication media is the common platform for attackers to conduct fraudulent activities via spoofed e-mails and fake websites and this research has combined the merit and demerits of the deep learning approaches adaption in email security threat by the usage of models and technologies.The study highlighted the contrasts of deep learning approaches in detecting email security threats.This review study has set criteria to include studies that deal with at least one of the six machine models in cyber security.

    KEYWORDS Attackers;deep learning methods;e-mail security threats;machine learning;phishing

    1 Introduction

    Cyber security plays a vital role in advancing technology,internet services,and applications.It is essential for both organizations and individuals.Cyber attackers are increasingly using malware,sometimes known as “malicious software,”such as viruses,worms,Trojan horses,and spyware,to infect businesses with a range of attacks.Research on leveraging the classification power of deep neural networks in the security of e-mails is relatively new.Deep neural networks,such as Convolutional Neural Networks,Long Short Term Memory Networks,and Recurrent Neural Networks are some important networks,which resulted in designing and improving the security of e-mails.Therefore,literature related to the methodologies of such deep learning techniques in e-mail threat detection highlights the findings of this research and finds the existing gaps in this area.Attackers can easily modify rights,access confidential data,observe user activity,and carry out other nefarious deeds[1,2].

    “Business E-Mail Compromise”(BEC),is an email-borne employee impression that has become a significant security threat and is thus named“Federal Bureau of Investigation(FBI)”[3].Almost$2.7 billion has been lost by U.S.organizations in 2018 and$12 billion collectively since 2013[4].Several well-known companies have witnessed such attacks,such as Ubiquiti,Facebook,and Google[5,6].

    Blacklisting comprises blacklisted senders’list whose email and IP addresses are blocked and categorized as a list-based filter.Spamming and phishing can be detected through different techniques like heuristics and blacklisting[7].The main issue concerning the procedure of blacklisting is that filters check the presence of newly arrived emails or Uniform Resource Locators (URLs) in the existing blacklisted records.If the email or URL is present,it will be classified as a malicious email.Moreover,a lot of time is taken to detect the blacklisted emails with the help of the heuristics technique [8].The studies relating to the classification of email spam and the techniques used in the organization to control the threats related to security.The research identifies that spam threats are present in any account and can easily be transferred all around the world in the system or the network.In the study,Term frequency-inverse document frequency was a proposed method approach using a support vector machine which is one of the tools to calculate the matrices and accuracy of the algorithms in datasets[9,10].According to one of the studies,Thermal Emission Imaging System(THEMIS)is one of the deep learning models which identify and improve the word level in spam emails.The percentage accuracy of these models on educating data sets is 99.9%and the analytical data set are 98.9%[10].The professionals,engineers,and researchers who believe in the general area of e-mail security,and especially those designing and developing robust techniques for detecting e-mail threats would benefit from the findings of this comprehensive review.Thus,machine learning techniques are likely to offer better outcomes as compared to classical heuristic and blacklisting techniques.

    Many recent studies proposed the methodologies but this research has combined the merit and demerits of the deep learning approaches adaption in email security threats.The study aims to investigate deep learning approaches for detecting the threats associated with e-mail security.This study compiles the literature related to the deep learning methodologies which are applicable for providing safety in the field of cyber email security of different organizations.Deep learning approaches are comprised of different models and their application needs more advancement in the field of technology networks which is a more complex and newer approach than the traditional machine learning approaches,even though deep learning is considered a subset of machine learning[11].Furthermore,examples are encompassed to show how the techniques have been utilized in e-mail security.

    The main contributions of this study are as follows:

    ? Create a theoretical base for email security using deep learning methods.Unlike previous reviews,this review investigates papers published between 2016 and 2022,from pre-defined resources,and based on pre-defined inclusion/exclusion criteria.

    ? Provides a comparison between challenges in detecting email security using deep learning and detection methods with their performances.

    ? Identify research gaps in email security and suggest future possible research directions.

    The rest of the paper is organized as follows:Section 2 discusses the related works to our investigation.Section 3 presents the methodology of conducting this review including the inclusion/exclusion criteria.A review of the different types of email attacks is presented in Section 4.In Section 5,a comprehensive investigation of the different techniques used in email security is discussed.Section 6 presents a discussion of the pros and cons of the different deep learning methods used in email security.

    2 Literature Review

    2.1 Internet of Things

    The Internet of Things(IoT)is a new emerging technology that generates much data nowadays.Today,IoT is largely a concept in which everything is interconnected via the Internet.IoT is presently and will undoubtedly be the cornerstone for future development since it opens up new avenues for unique services.The IoT market is thriving because the number of calculations that a computer can perform almost doubles biannually.In comparison,the size and quantity of electricity required over the same period are approximately half [12].This implies that smaller and more powerful devices for connectivity and data transmission are now accessible,allowing for a broader range of applications.This component raises severe security concerns,which will be addressed immediately.Spamming difficulties are on the rise as a result of the rise of IoT.To identify and filter spam and spammers,numerous spam detection approaches are presented [13].Existing spam detection systems are broadly classified into two categories: semantic pattern-based approaches and behavior pattern-based approaches.Every business carefully assesses the available solutions to combat spam in their environment to correctly detect spam emails and prevent escalating email spam challenges.Whitelist/Blacklist,keyword checking,mail header analysis,and other well-known procedures are employed for identifying and analyzing incoming emails for spam detection.

    2.2 E-Mail as Medium of Communication

    The usefulness of communication via email has pointed to the issue of large-scale spam,specifically e-mail attacks.To address the problem of phishing attacks,several measures against phishing have been proposed.Sheng et al.[14]examined the efficiency of phishing blacklists.The Blacklist majorly contains a Blacklist of senders and a Blacklist of links.This discovery method receives the sender’s address and contact information in the e-mail and checks whether it has been blacklisted.Users are usually notified of updates to the Blacklist and manually detect whether it is a phishing scam.There are currently two known websites for this purpose,PhishTank,and OpenPhish.In this regard,the outstanding performance of the Blacklist shows that the method is well based on the responsive list of hardware logistics.Notably,the link between natural language processing and machine learning has immensely contributed to the discovery of online phishing.Semantic features [15],grammatical features[16],and contextual elements[17]have previously been used in this field.Vazhayil et al.[18]commenced with the fundamental techniques for net phishing analysis.Hamid et al.[19]investigated the use of a hybrid process that merges content and behavior.Email-based analytics majorly uses tagged phishing e-mails and legitimate e-mails for training and sorting to acquire a sorting model for online sorting.Bergholz et al.[20] proposed a set of actions,divided into three categories: basic features,latent topic features,and the powerful features of the Markov chain.The basic features represent extraction directly from the email without extra processing.The topic model features cannot be extracted from email while they appear similar and together.However,Dynamic Markov chain features are text features based on the bag-of-words,where the goal is to compute the probability of whether an email belongs to a specific group by modeling each type of message content.

    According to the latest research,email security threats are having domains to be emphasized for the real identification of users,the content of the emails which hack the Internet integrated technologies by their exposure on the device.The simple login in the technology can absorb all the accessible data of the network.While combining machine learning,deep learning methodologies with the algorithms of the neural network have to control the traffic of the email spasm.As email is one of the cheapest and most easily accessible platforms all around the world.Natural language processors are one the efficient way to understand the nature of the email,whether the source is authenticated for the future aspect or not[21,22].

    One disadvantage of Natural language processing(NLP)-based machine learning in online phishing is that it is based on the surface text of the e-mail rather than deep semantics.Therefore,with NLP based on machine learning,it is difficult to find synonyms,various sentence types,and other variants[23].Also,machine learning methods rely primarily on attribute creation to create e-mail attributes and perform tasks through these attributes.Both blacklisting and functional engineering should be performed manually and need a large workforce and experienced specialists,which restricts the success of the analysis.On the other hand,deep learning has been successful in various NLP projects,which include text categorization[24],information extraction[25],and machine translation[26].

    2.3 E-Mail Text Representation

    Bag-of-word is an approach for extracting features in text data and is thus used as e-mail text representation[27].The vocabulary of the predefined words and the extent of their occurrence are the two aspects encompassed within the model[28].

    A term document matrix is an approach to represent the text based on its presence in the document[29].The documents are expressed through the horizontal rows,while the terms that occurred in the corpus are described in the vertical columns.The term frequency-inverse document matrix determines a word’s relevancy in a predefined document [30].The inverse document frequency indicates how much data a specific comment offers,whether a rare or a common phrase[31].Thereby,singular value decomposition can be initiated for the symmetric diagonal decomposition (SDD) [32].A document term matrix can be developed using different terms from a pair of documents in this process [33].Random weights initialize the embedding layer and explore embedding for all training dataset words.The first hidden layer of a network is conceptualized through the embedding layer.

    2.4 Deep Learning

    Here in text,scientists and researchers use machine learning (ML) and Deep learning (DL)models in several applications including agriculture [34],environment [35],text sentiment analyses[24],medicine[36],and in cyber security[37].

    ? Planet scope Nanosatellites Image Classification Using Machine Learning[38]

    ? Convolutional Neural Network-Based Automated Weed Detection System Using Unmanned Aerial Vehicle UAV Imagery[39]

    ? Synthetic Minority Oversampling Technique with Deep Neural Network (SMOTEDNN): A Novel Model for Air Pollution Forecasting (APF) and Air Quality Index (AQI)Classification[40]

    ? Climate Deep Long Short-Term Memory (CDLSTM): A Novel Model for Climate Change Forecasting[41]

    ? Ground water level prediction using machine learning models[42]

    ? Deep Learning-Based Supervised Image Classification Using UAV Images for Forest Areas Classification[43]

    ? Bulk Processing of Multi-Temporal Modis Data,Statistical Analyses,and Machine Learning Algorithms to Understand Climate Variables in the Indian Himalayan Region[44]

    ? Study of permafrost distribution in Sikkim Himalayas using Sentinel-2 satellite images and logistic regression modeling[45]

    ? The efficiency of artificial neural networks for glacier ice-thickness estimation:A case study in the western Himalayas,India[46]

    ? Sentiment analysis using machine learning: Progress in the machine intelligence for data science[47]

    ? Fine-tuned convolutional neural network for different cardiac view classifications[48]

    ? Insider Threat Detection Based on Natural Language Processing Word Embedding and Machine Learning[49]

    ? Classification of botnet attacks in Internet of Things Using a Convolution Neural Network[50]

    ? A survey of Convolution Neural Network based Network intrusion detection [51],natural language processing[48],and speech recognition[52].

    Based on their architectures,deep learning models may be divided into four groups:

    ? Deep feed-forward neural network (DFNN),which includes several multi-layer deep learning models such as deep belief network [53],deep Boltzmann machine [54],and deep autoencoder[55]

    ? Convolutional neural network (CNN),which uses the convolutional and pooling layers to achieve the shift-invariant property

    ? Recursive neural network(RvNN),which accepts a recursive data structure of various sizes and generates hierarchical predictions

    ? Recurrent neural network (RNN),which has an internal hidden state to capture sequential input.

    The most popular machine learning-based classifier is the support vector machine,which helps in detecting phishing and spam emails.A feature map based on the train sets and predefined transformation is built.Moreover,the phishing and spam emails are also filtered with the help of classifiers like K-nearest neighbor(KNN),in which the decisions are taken considering the K-nearest train input.A predefined similarity function is used for choosing the samples.Another classifier named Na?ve Bayes considered the simple probabilistic classifier is also used.It is also possible to incorporate boosting techniques considering sequential adjustment during the process of classification.The term frequency-inverse document frequency (TF-IDF) and hand-crafted feature engineering are used for converting the email into email vectors.The reliance on classical machine learning algorithms for feature engineering is considered the major disadvantage [56].The accuracy can be increased by selecting the best feature and for selecting the best feature there is a need for adequate knowledge about of domain.There is a decrease in the algorithm’s predictive value when the feature engineering is not performed correctly.Moreover,the models can be predicted with the help of classical machine learning algorithms.Feature extraction during the classical machine learning workflow takes most of the time.

    Recently,leverage has been given to the application of deep learning architectures for different cases using cyber security such as detecting phishing and malicious URL[57],intrusion detection[58],malware detection [59],detecting malicious domain names [60],and detecting phishing e-mail [61].Deep learning architecture is can extract optimal features without any reliance on feature engineering.Therefore,deep learning architecture is considered to be robust in an adversarial environment,as compared to classifiers of classical machine learning.

    2.5 Deep Learning Tools

    Deep learning tools can automatically create active e-mail operations for detecting phishing e-mails.Thereby,the emphasis is on using deep learning to discover e-mail phishing in a more complete and comprehensive description of e-mail information.Repke et al.[62]returned the structure to a free-text e-mail conversation with in-depth study and word usage.Although this work is not about analyzing e-mails by e-mail,it is still illustrative for us to use deep learning and built-in word technology to use e-mails.Hiransha et al.[63] and Keras [64] suggested Word Connection and Convolutional Neural Networks (CNN) for building a phishing e-mail discovery model.There are other in-depth algorithms in use,such as Deep Fault Networks (DBN) and Recurrent Neural Networks(RNNs)[65–67].These in-depth methods of counterfeiting e-mail analytics only apply NLP technology to fake e-mail analytics and ignore the difference between counterfeit e-mail and other goals.Contextual information is avoided to some extent.

    Xu et al.[68]proposed region-based convolutional neural network(RCNN)for text classification in 2015.They investigated it on four different datasets,which include 20 Newsgroups datasets(2018),Fudan library (2018),Association for computational linguistics (ACL) corpus network (2018),and Stanford Attitude tree library (2018).They were found to be effective as compared to the standard CNN.RCNN can generate highly complex sequencing tasks.Based on why e-mail is also a problematic text,this article introduces the THEMIS model based on RCNN.Zhang et al.[65]suggested different methodologies in machine translation.Lee et al.[69] studied attention-grabbing methods of neural machine translation(NMT)and their implication on life.Attractive ways are very beneficial in several areas and can enhance image classification[70],automatic captions[71],and machine translation[72].Pappas et al.[73] examined the hierarchical review process for document categorization and were successful in 2016.

    For accurate compilation,the J48 classification algorithm deals with the extracted properties of data entered into the e-mail classification.Senturk et al.[74] treated pointless markup and new pages as feature sets and choose some features with better predictability from the initial operations.They provide O(1)complexity as an assessment method for each element set to assess its predictive power.Brites et al.[75] suggested solutions to overcome the lack of time to analyze phishing.The solution provided for phishing by analyzing the characteristics of who is Responsible for this domain name(WHOIS)and their URL information.Deep learning methods detect malicious URLs and domains [61].Unnithan et al.[61] have used Hypertext markup language (HTML) content to analyze net phishing.Databases that contain reported phishing for this purpose,are used for many different purposes.Baykara et al.[76]used different types of classification methods,such as multi-layer perception(MLP),decision tree(D.T.),support vector machine(SVM),method of data processing like Group method of data handling (GMDH),probable neural network (PNN),genetic programming(G.P.) and logistic regression (L.R.).Mahesh [77] proposed a method for analyzing e-mails by email with mixed features.It is called hybrid action because it combines URL-based,behavioral,and competitive actions.Overall calculated achievement remains 97.25%and an error rate of 2.75%.Hiransha et al.[63] suggested a weak assessment method that works through anomaly analysis,detecting a system where behavior deviates from a standard procedure.Karim et al.[78] created a machine-learning model for analyzing e-mails by e-mail.Using predictive analytics,a machine learning model was designed to use static analytics to distinguish between phishing and legitimate e-mail.

    2.6 Architecture of Deep Learning

    Classification of URLs as malicious or benign is represented in deep learning architecture in Fig.1.The three national sections present in this architecture are:

    ? URL’s character coding—convert characters into a format to be transmitted over the Internet

    ? Representing features via deep layers—arranging high-dimensional vectors in a compact image form conducible for deep learning

    ? Classification—non-linear activation function to assign scores

    2.7 Deep Neural Network

    Artificial neural network (ANN),a computational model,is affected by features of biological neural networks.The family of ANN includes a convolutional neural network,recurrent neural network (RNN),and feed-forward neural network (FFN).A graph comprising neurons known as mathematical units is formed by FFN.The continuous cycle is formed as information is passed on by FFN from one side of the node to another.Therefore,past values are not highly valued.As shown in Fig.2,the MLP is a kind of FFN comprising 3 or more layers:

    ? Input layer—receives the input signal to be processed

    ? Hidden layers(may be more than 1)—the true computational engine of the MLP

    ? Output layer(comprises of neurons known as units in mathematical notation)—performs tasks such as prediction and classification

    The choice of the hidden layer is made considering the hyper-parameter tuning method.The sigmoid non-linear activation function is used by the classical multi-layer perceptron.

    Figure 2:Hidden layers in the deep neural network[8]

    3 Methods

    3.1 Threats to Validity

    This review study has set criteria to include studies that deal with at least one of the six machine models in cyber security.The target cyber threats include spam,detection,intrusion,and malware detection.For searching different string combinations were used for instance: ‘machine learning and cyber security and ‘deep learning and cyber security.Moreover,relevant data was taken from the Association for Computing Machinery (ACM) Digital Library,Science Direct,Web of Science,Scopus,IEEE Xplorer,and SpringerLink.Google Scholar.In addition to the papers provided,the prior survey and review articles were used to offer a thorough performance rating.

    3.2 Paper Filtering

    After downloading the paper results from the search using the search terms discussed above,the study analyses articles that are available in Open access.Irrelevant and duplicate documents were removed by applying the exclusion criteria (shown below).The following inclusion/exclusion rules are used in these papers.After screening studies through inclusion and exclusion the study includes 101 studies in this review article.The inclusion criteria of the study are:

    ? Papers published within the last decade.

    ? Papers in the area of detecting e-mail threats using deep learning techniques.

    ? Papers are written in the English language.

    ? Papers that are available in Open access.

    The exclusion criteria of the study are:

    ? Papers on deep learning but not on e-mail threat detection.

    ? Papers with unclear citation information include year,authors,publisher,etc.

    ? Papers with unclearly written methodology.

    ? Papers with that are not available on Open access.

    4 Review Analysis

    4.1 E-Mail Security Threats

    E-mail is frequently the target of attacks since it is widely deployed,used,and well-understood for communicating with untrusted external organizations.Attackers can exploit e-mails to gain control over an organization,disrupt Information Technology.Access to resources,and access confidential information[80].The following are the common threats to e-mail systems:

    4.1.1 Malware

    Progressively,attackers benefit from e-mails for delivering a myriad of attacks to corporations through malicious software or malware that encompass viruses,spyware,worms,and Trojan horses[81].If successful,such attacks may offer negative entity control over servers and workstations,which can be exploited for transforming advantages,gaining access to sensitive information,monitoring users’activities,and performing other malicious activities[82].Deep learning techniques are also used in post-production.In other words,after the malware’s analysis (training) of the available signaling data,the analysis tool(detection system)can be tested based on new real-time data for performance evaluation.

    4.1.2 Spam and Phishing

    Spam messages disturb consumer productivity,use information technology resources excessively,and are used as a dissemination platform for malware[83].Phishing is related to spam and refers to deceptive computer-based ways to trick individuals into reacting to the e-mail and disclosing sensitive information.Spam messages are delivered through compromised e-mail systems using an alternate e-mail address[84].

    4.1.3 Social Engineering

    E-mail can be used by an attacker instead of hacking into a system to collect sensitive information from consumers of an organization or getting users for performing activities.E-mail spoofing is a typical social engineering attack.One individual or program successfully pretenses as another by fabricating sender information in e-mails to hide the true origin[85].

    Table 1 presents a review of e-mail security using deep learning,discussing various concerned topics and studies conducted by different authors over the years.It highlights the threats related to email security,such as e-mail-based attacks aimed at seizing control of companies and accessing private information.It also covers malware,spam,phishing,and social engineering issues in e-mail security,as well as the use of deep learning for managing bulk e-mails and controlling security on smart devices.

    Table 1:Reviewing e-mail security using deep learning

    4.2 Deep Learning Methods for Handling Email Security Threats

    4.2.1 Content-Based Filtering Technique

    In the content-based recommender system,the explanations related to the target item play an essential role in making predictions.These explanations are termed Content.In the content-based recommender system,the past purchasing designs and the senior ratings of the users,along with the item’s content,are collectively utilized,keeping in mind the end goal to arrive at predictions.The primary thought behind the content-based recommender system is that user interests can be determined based on features or properties of the items they have graded or used previously.Contentbased systems suggest items because of a close examination between the description of the items and a client’s profile.The component of items is mapped with the highlight of clients keeping in mind the end goal to get a client–item similarity.The best-coordinated pairs will be recommended as suggestions.In the recommendations of documents to the users such as articles,papers,weblogs,web pages,publications,and so on,the content-based recommender systems are regarded as the most successful filtering technique.Content based filtering(CBF)used many different models,such as the vector space model,neural networks,decision trees,etc.,to find or measure document similarity.

    4.2.2 Case-Based Spam Filtering Method

    It is one of the well-known spam filtering methods.In particular,pre-processing steps transform the e-mail via client interface,selection,process assessment,feature extraction,and e-mail data grouping.Initially,extraction for both spam and non-spam e-mails is made using the collection model.Afterward,the data is categorized into two vector sets.Finally,the deep learning algorithm is utilized for training datasets and testing them for deciding whether the prospective mails are spam or non-spam[88].

    4.2.3 Recommender System

    The first important point or approach in the recommendation system is predicting the rating value for the compound of the user item.In this case,the assumption is to predict data through the user’s preferences for specific items.An M×N matrix is created to record the M user,and N items were recorded values used for the training model.The problem has occurred in the system due to a lack of accuracy as the system is based on an assumption.This problem is often known as the matrix completion problem because the matrix of values is recorded incomplete,and all other values are forecasted by learning algorithms.The other common problem in the recommendation system is the ranking problem.In the real scenario,it is not necessary that predicted items must be based on the user’s past preferences because a user may not like any item again,which was considered in the past.The requirement for new item recommendations is not only based on ratings of user-specific preferences.So,the merchant should present something new to the user which may attract him more than past.

    4.2.4 Likeness-Based Spam Filtering Technique

    The likeness-based recommender system requires related data about various accessible things as the content alongside the client’s profile,which must follow the client’s preferences.In the contentbased recommender system,the past purchasing designs and the senior ratings of the users,along with the item’s content,are collectively utilized,keeping in mind the end goal to arrive at predictions.This technique is recommended the ideas to the users by comparing the user preferences and the content related to the items.Afterward,the current circumstances are assigned to the most well-known class of its K-closest training cases[89].The K-nearest neighbor is used in this approach to filter spam emails.The newest form of likeness-based spam filtering technique is the support vector machine,the art classification technique to experience unwanted mail[90].

    4.2.5 Adaptive Spam Filtering Technique

    The primary thought behind the content-based recommender system is that user interests can be determined based on features or properties of the items they have graded or used previously.The explanations related to the target item play an essential role in making predictions.These explanations are termed Content.Content-based systems suggest items because of a close examination between the description of the items and a client’s profile.The component of items is mapped with the highlight of clients keeping in mind the end goal to get a client–item similarity.The best-coordinated pairs will be recommended [91].Previously,Seth et al.[92] applied multimodal spam classification using deep learning techniques.Similarly,Long Short-Term Memory(LSTM)and Bidirectional-LSTM(Bi-LSTM)were used in a previous paper conducted by Sethi et al.[93].

    Table 2 reviews different deep learning methods for handling email security threats,specifically focusing on spam filtering techniques.The first study proposes a Case-Based Spam Filtering Method using deep learning to identify and classify spam emails based on training and evaluating datasets.The Likeness-Based Spam Filtering Technique,as described in the second study,suggests ideas to users by comparing user preferences and related email content.The third study presents an Adaptive Spam Filtering Technique that utilizes deep learning algorithms to map item components with user highlights,recommending the best-coordinated pairs as suggestions to users.Additionally,the third study mentions the use of Bi-LSTM and LSTM in classifying multimodal spam.

    Table 2:Reviewing deep learning methods for handling email security threats

    5 Discussion

    Email is commonly used for official communication between people.Therefore,attackers frequently attack emails to access confidential information.Emails are attacks by malware which is also reported by Zeng[81]who stated that attackers benefit from e-mail for delivering a myriad of attacks to corporations through malicious software or malware.The spam is sent using a different email address and delivered through infected email systems as also stated by Patel et al.[84].

    The cyber realm has massive amounts of data from many sources,to which deep learning may be applied.However,a study in this area is complicated by the scarcity of publicly available datasets,which are either tiny,outdated,or developed internally and not shared among researchers.Large,frequently updated benchmark datasets will be essential to improve cyber security solutions to build genuine confidence in deep learning algorithms.Furthermore,the ability to evaluate detection rates,speed,memory utilization,and other performance parameters require the capacity to test suggested deep learning algorithms in real-world operating settings.The cyber security sector has just recently begun to recognize the usefulness of Deep Learning,and new datasets are appearing.

    Email security is among the most common issue encountered in recent times;therefore,several solutions are provided for controlling email security threats.However,the attackers usually modify their attack strategy by exploiting the existing solution’s susceptibilities.The email security threat can occur through the most common ways are malware,social engineering,and using fake e-mail or web pages which is in line with studies[94].

    The DNS protocol is deployed through a DNS-based Blacklist for controlling phishing e-mails.However,a server experiences constraints concerning performance and resources because of many blacklisted e-mails.The term frequency and the inverse document frequency are essential concepts in an information retrieval system.The term frequency,denoted as term-frequency(TF),is the frequency of the specific terms in a particular document.It simply tells how many times the specific term appears in a document.At the same time,the inverse of the document is denoted by the inverse document frequency(IDF),which considers the terms with the lowest frequency.Suppose a user makes a search on Google for“the rise of technology”,it is undoubtedly the term“the”will must have a high frequency than the term“technology”.Still,the importance of the term technology cannot be denied as well from the query point of view.In such situations,the tf-idf discredits the impact of highly repeated words in a document to decide the significance.

    According to the study,the smart devices which are integrated with the internet of things have many issues related to network access control,email,bank account,identity address authentication,and verification.The methods are introduced to control easy access by the hacker or the bad internet organization.Many advantages and shorthand techniques for safety development related to deep learning and machine learning handling are suggested to save the privacy of the individual on its own[87].

    The service provider ensures authentication at the domain level [95].E-mail based on domain name and hash password is used for authenticating e-mail level authentication as a digital signature[96].It has been witnessed that most consumers ignored e-mail authentication,which became one of the significant barriers.Spoofed hyperlinks are a prevalent attribute in phishing e-mails.For instance,Chen et al.[97]examined the actual and visual associations for any variations.So,if the specific term appears many times in a document,it will reduce its weight automatically.Similarly,if a term appears a few times in documents,it is evident that the term has a higher weight.The IDF uses the log to dampen the impact of high-frequency terms[98].In the review study by Kong et al.[86]enclosed are the management strategies to control the trafficking of the bulk email related to the promotion and advertisement of the organization or the media.The uncontrolled feedback on the product makes the user tired and wastes the time the user goes through every email.The most difficult part that user faces is the deletion of thousands of emails all at once.This traffic diverts the focus of the relevant communications[99].

    It is recommended that the future of e-mail security systems lies in deep learning for deep adversarial learning and content-based classification techniques.Deep understanding enables computers to learn from knowledge and experience irrespective of comprehensive programming and significant patterns from primitive data[100].In recent studies,the user who is using electronic email faces many fake email trafficking which disturbs the storage capacity and several cloud tool systems are invented for the protection of the systems[101].

    6 Study Limitation

    The conventional machine learning algorithms were very complicated for mining appropriatelyrepresented attributes due to the restrictions that classified such algorithms.The limitations of the traditional machine learning algorithms encompass high computational costs,the need for knowledge from professionals in a specific field,and the curse of dimensionality.Deep learning techniques are deployed to solve representation issues by constructing several Na?ve attributes to represent a multifaceted concept.Deep learning will be more influential in solving the problem of spam e-mails.Since the number of available training data is rising,the efficiency and effectiveness of deep understanding have become more considerable.Papers that are available in Open access are easy to access for extraction of the relevant studies but all the papers relevant to this study are not as open access.This is one of the main study limitations that every relevant study was not available to collect more information or for comparison.

    7 Conclusion

    The present study has investigated deep learning approaches for detecting the threats associated with e-mail security.This survey aims to present a relevant body of work to encourage academics to enhance the state of deep learning for cyber security systems.This study classified e-mail security threats,including social engineering,malware,spam,phishing,uncontrolled traffic of advertisement emails,and spam are aligned with discussion through various solutions for handling these threats.The compilation of different studies in this paper identifies many platforms for the organization to observe the internet system’s security in the form of email trafficking.E-mail security can be detected easily by the coding method and spam email can be easily filtered by many computer software and the network by different learning models of deep learning and machine learning.This highlighted many visionary modules which are part of our daily life that require the safety development by cyber security to protect their dataset of the smart devices and the organization.LSTM and Bi-LSTM,the THEMIS model based on RCNN,and many models are integrating and designing the best platform to provide deep learning approaches for the detection of email security.Various solutions were classified as fake page detection or spoofed e-mail filtering.Identifying malicious actions can be improved by including these two sub-modules in the current framework.Although,many recent studies proposed the methodologies but this research have combined the merit and demerits of the deep learning approaches adaption to the email security threat.Future studies need to investigate technologies based on protected software or strategies or network to differentiate between useful email and spam email.Moreover,future studies also need to develop the strategy of deleting the bulk email at a more organized and organizational level as it is a time-consuming process.

    Acknowledgement:The authors would like to express their deep thankful and grateful to all the associated personnel in any reference that contributed in/for the purpose of this research.

    Funding Statement:This study is supported via funding from Prince Sattam bin Abdulaziz University Project Number(PSAU/2023/R/1444).

    Author Contributions:M.M.Saeed: conceived and designed the experiments,analyzed the data,prepared figures and tables,authored and reviewed drafts of the manuscript,and approved the final manuscript.Z.Aghbari:analyzed the data,prepared figures and tables,authored and reviewed drafts of the manuscript,and approved the final manuscript.

    Availability of Data and Materials:The data that support the findings of this study are available from the corresponding author M.M.Saeed,upon reasonable request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲精品色激情综合| 欧美成人精品欧美一级黄| 精品久久久久久久久亚洲| 精品国产一区二区三区久久久樱花 | 99久久精品热视频| 国产av在哪里看| 日韩欧美 国产精品| 精品国产一区二区三区久久久樱花 | 观看免费一级毛片| 三级毛片av免费| 午夜爱爱视频在线播放| 亚洲精品久久午夜乱码| 亚洲18禁久久av| 日本wwww免费看| a级毛片免费高清观看在线播放| 亚洲国产最新在线播放| 亚洲不卡免费看| 欧美一级a爱片免费观看看| 少妇熟女欧美另类| 亚洲国产色片| 男插女下体视频免费在线播放| 日韩大片免费观看网站| 国产三级在线视频| 亚洲av中文av极速乱| 91久久精品电影网| 777米奇影视久久| 午夜老司机福利剧场| 高清毛片免费看| 亚洲欧美成人精品一区二区| 伊人久久精品亚洲午夜| 97超碰精品成人国产| 午夜福利成人在线免费观看| 韩国高清视频一区二区三区| 国产亚洲精品久久久com| 一二三四中文在线观看免费高清| 国产免费视频播放在线视频 | 免费av不卡在线播放| 久久久久国产网址| 精品久久久久久久人妻蜜臀av| 久久精品熟女亚洲av麻豆精品 | 久久久久久久久久久丰满| 秋霞在线观看毛片| 美女高潮的动态| 免费看日本二区| 精品一区二区三区视频在线| 久久久久九九精品影院| 午夜福利视频1000在线观看| 日韩成人av中文字幕在线观看| 日韩成人av中文字幕在线观看| 乱人视频在线观看| 日本猛色少妇xxxxx猛交久久| 亚洲欧洲日产国产| 五月玫瑰六月丁香| 最近最新中文字幕免费大全7| 亚洲综合色惰| 国产av在哪里看| 两个人的视频大全免费| av网站免费在线观看视频 | 久久这里只有精品中国| 美女大奶头视频| 国产午夜精品久久久久久一区二区三区| 蜜臀久久99精品久久宅男| 成人亚洲精品一区在线观看 | 日韩人妻高清精品专区| 九九在线视频观看精品| 国产精品麻豆人妻色哟哟久久 | 麻豆久久精品国产亚洲av| 欧美区成人在线视频| 黄色日韩在线| 国产一级毛片七仙女欲春2| 最新中文字幕久久久久| 六月丁香七月| 亚洲av在线观看美女高潮| 黄色日韩在线| 美女黄网站色视频| 亚洲av一区综合| 男女视频在线观看网站免费| 最近中文字幕高清免费大全6| 久久久久久伊人网av| 免费电影在线观看免费观看| 在线免费观看的www视频| 亚洲av男天堂| 久久久国产一区二区| 国产成人a∨麻豆精品| 男人狂女人下面高潮的视频| 国产亚洲av片在线观看秒播厂 | 直男gayav资源| 亚洲精品456在线播放app| 欧美成人精品欧美一级黄| 亚洲av电影不卡..在线观看| 精品久久久久久久久久久久久| 国产成人精品一,二区| 亚洲av成人精品一区久久| 色尼玛亚洲综合影院| 久久久久久久国产电影| 国产在线一区二区三区精| 精品一区二区三卡| 日本-黄色视频高清免费观看| 亚洲精品,欧美精品| 亚洲激情五月婷婷啪啪| 国内精品美女久久久久久| 国产极品天堂在线| 91av网一区二区| 亚洲成人精品中文字幕电影| 亚洲av男天堂| 久久精品久久久久久噜噜老黄| 男人舔女人下体高潮全视频| 国产综合精华液| 国产精品久久久久久精品电影小说 | 国产精品熟女久久久久浪| 丰满少妇做爰视频| 水蜜桃什么品种好| 免费在线观看成人毛片| 久久久久久久国产电影| 国产免费又黄又爽又色| 亚洲精品亚洲一区二区| 五月天丁香电影| 午夜亚洲福利在线播放| 69人妻影院| 日日摸夜夜添夜夜爱| 日韩亚洲欧美综合| 99久国产av精品国产电影| 国产美女午夜福利| 国产一级毛片在线| 中文字幕人妻熟人妻熟丝袜美| 美女脱内裤让男人舔精品视频| 又大又黄又爽视频免费| 国产精品爽爽va在线观看网站| 狂野欧美激情性xxxx在线观看| 18禁在线播放成人免费| 日韩av在线大香蕉| 午夜福利在线观看吧| 麻豆乱淫一区二区| 内地一区二区视频在线| 国产午夜精品一二区理论片| 日韩欧美 国产精品| 免费电影在线观看免费观看| 免费电影在线观看免费观看| 久久久久久久久大av| 久久久久久国产a免费观看| 最近中文字幕高清免费大全6| 综合色av麻豆| 亚洲欧美日韩卡通动漫| 午夜爱爱视频在线播放| 久久久久久久国产电影| 欧美日本视频| 在线天堂最新版资源| 蜜臀久久99精品久久宅男| 精品国产三级普通话版| 国国产精品蜜臀av免费| 少妇猛男粗大的猛烈进出视频 | 国产成人91sexporn| 免费大片18禁| 成人二区视频| 精品久久久久久成人av| 亚洲熟妇中文字幕五十中出| 91久久精品国产一区二区成人| 欧美xxxx性猛交bbbb| 日韩国内少妇激情av| 国内揄拍国产精品人妻在线| 97精品久久久久久久久久精品| 天天一区二区日本电影三级| 精品久久国产蜜桃| 99热这里只有精品一区| 国产精品一区二区性色av| av在线天堂中文字幕| 亚洲久久久久久中文字幕| 永久网站在线| 青青草视频在线视频观看| 精品亚洲乱码少妇综合久久| 国产午夜精品久久久久久一区二区三区| 亚洲高清免费不卡视频| 尾随美女入室| 高清日韩中文字幕在线| 国产一级毛片在线| 精品一区二区三区人妻视频| 91久久精品国产一区二区成人| 成人综合一区亚洲| 日韩精品有码人妻一区| 日韩一区二区三区影片| 欧美日韩一区二区视频在线观看视频在线 | 国产熟女欧美一区二区| 午夜亚洲福利在线播放| 中文在线观看免费www的网站| 久久精品人妻少妇| 美女内射精品一级片tv| 国产成人一区二区在线| 黑人高潮一二区| 韩国高清视频一区二区三区| 亚洲精品aⅴ在线观看| 一个人免费在线观看电影| 老女人水多毛片| 亚洲av中文av极速乱| 精品久久久久久久末码| 亚洲,欧美,日韩| 日韩三级伦理在线观看| 九九爱精品视频在线观看| 国产永久视频网站| videossex国产| 18+在线观看网站| 亚洲国产精品专区欧美| 熟女人妻精品中文字幕| 亚洲国产高清在线一区二区三| 激情 狠狠 欧美| 伊人久久国产一区二区| 日韩精品青青久久久久久| 男女视频在线观看网站免费| 亚洲性久久影院| 最近最新中文字幕免费大全7| 人妻少妇偷人精品九色| 亚洲成色77777| 一级毛片电影观看| 亚洲在线观看片| 国产三级在线视频| 观看美女的网站| 精品欧美国产一区二区三| 欧美日韩在线观看h| 国产精品一区二区三区四区久久| 久久久久性生活片| 亚洲第一区二区三区不卡| 国产精品女同一区二区软件| 国产激情偷乱视频一区二区| 国产欧美另类精品又又久久亚洲欧美| 亚洲不卡免费看| freevideosex欧美| 在线免费十八禁| 国产精品.久久久| 久久久久久久午夜电影| 国产成人a区在线观看| 哪个播放器可以免费观看大片| 久久久色成人| 亚洲经典国产精华液单| 搡老妇女老女人老熟妇| 亚洲精华国产精华液的使用体验| 一边亲一边摸免费视频| 国产在视频线在精品| 只有这里有精品99| 国产淫片久久久久久久久| 女人久久www免费人成看片| 夫妻午夜视频| 黄色欧美视频在线观看| 我的女老师完整版在线观看| 精品久久久久久成人av| 亚洲精品日韩av片在线观看| 51国产日韩欧美| 欧美日韩综合久久久久久| 日韩强制内射视频| 午夜免费观看性视频| 99热网站在线观看| 成人二区视频| 亚洲精品,欧美精品| 五月天丁香电影| 网址你懂的国产日韩在线| 春色校园在线视频观看| 黄色一级大片看看| 综合色丁香网| 尾随美女入室| 国产高清国产精品国产三级 | 国产精品熟女久久久久浪| 大香蕉久久网| 日日干狠狠操夜夜爽| 欧美变态另类bdsm刘玥| 国产av不卡久久| 伊人久久国产一区二区| 国产黄频视频在线观看| 免费黄色在线免费观看| av在线蜜桃| 性插视频无遮挡在线免费观看| 欧美日本视频| 国产高清国产精品国产三级 | 色尼玛亚洲综合影院| 中文欧美无线码| 好男人在线观看高清免费视频| 国产精品一区二区三区四区免费观看| 久久久精品欧美日韩精品| 国产免费又黄又爽又色| 久久久久久久久久黄片| 老女人水多毛片| 看非洲黑人一级黄片| 日韩一区二区三区影片| 神马国产精品三级电影在线观看| 国产人妻一区二区三区在| 最近中文字幕2019免费版| 亚洲精品久久午夜乱码| 搞女人的毛片| 青青草视频在线视频观看| 日韩欧美一区视频在线观看 | kizo精华| 激情五月婷婷亚洲| 天堂av国产一区二区熟女人妻| 97超视频在线观看视频| 午夜久久久久精精品| 最新中文字幕久久久久| 狠狠精品人妻久久久久久综合| 久久精品人妻少妇| 国产成人aa在线观看| 精品熟女少妇av免费看| 欧美日韩国产mv在线观看视频 | 18+在线观看网站| 午夜激情久久久久久久| 最近最新中文字幕大全电影3| 精品国产三级普通话版| 九九爱精品视频在线观看| 国产精品无大码| 欧美xxxx性猛交bbbb| 国内精品美女久久久久久| 亚洲国产精品成人综合色| 天堂影院成人在线观看| h日本视频在线播放| 亚洲国产日韩欧美精品在线观看| 国产极品天堂在线| 国产精品久久视频播放| 亚洲在线观看片| 亚洲真实伦在线观看| 国产成人a∨麻豆精品| 青春草视频在线免费观看| 美女大奶头视频| 久久久久性生活片| 2021天堂中文幕一二区在线观| 日韩 亚洲 欧美在线| 寂寞人妻少妇视频99o| 精品久久久精品久久久| 国产精品久久久久久久电影| 午夜福利视频1000在线观看| 亚洲电影在线观看av| 亚洲高清免费不卡视频| 三级男女做爰猛烈吃奶摸视频| 久久97久久精品| 搞女人的毛片| 国产高清有码在线观看视频| 欧美激情久久久久久爽电影| 91久久精品国产一区二区成人| 免费看光身美女| 欧美一区二区亚洲| 中国美白少妇内射xxxbb| 一级毛片电影观看| 日韩在线高清观看一区二区三区| 嫩草影院精品99| 午夜视频国产福利| av一本久久久久| 国产在线男女| 成人特级av手机在线观看| 成人一区二区视频在线观看| 亚洲国产欧美人成| 午夜免费男女啪啪视频观看| 国产精品爽爽va在线观看网站| 午夜视频国产福利| 嫩草影院精品99| 免费看不卡的av| 综合色av麻豆| 国产伦在线观看视频一区| 最近视频中文字幕2019在线8| 人人妻人人看人人澡| 激情五月婷婷亚洲| 亚洲无线观看免费| 免费观看性生交大片5| 欧美+日韩+精品| 国产综合精华液| 欧美人与善性xxx| 亚洲av一区综合| 国产伦在线观看视频一区| 美女xxoo啪啪120秒动态图| 日韩成人伦理影院| 久久99热这里只频精品6学生| 99re6热这里在线精品视频| 综合色丁香网| 女人久久www免费人成看片| 亚洲国产精品成人综合色| 女人久久www免费人成看片| 国产免费视频播放在线视频 | 亚洲成人精品中文字幕电影| 日韩av在线大香蕉| 久久久久久久亚洲中文字幕| av国产免费在线观看| 美女cb高潮喷水在线观看| 免费大片黄手机在线观看| 精品午夜福利在线看| 亚洲国产色片| 国产伦在线观看视频一区| 精品久久久久久久久亚洲| 美女内射精品一级片tv| 成年女人在线观看亚洲视频 | 中文天堂在线官网| 少妇裸体淫交视频免费看高清| 又爽又黄a免费视频| freevideosex欧美| 高清欧美精品videossex| 99re6热这里在线精品视频| 中文精品一卡2卡3卡4更新| 国产91av在线免费观看| 久久精品夜夜夜夜夜久久蜜豆| 精品久久久久久成人av| 一级毛片 在线播放| 国产一区有黄有色的免费视频 | 别揉我奶头 嗯啊视频| 日韩制服骚丝袜av| 亚洲在线自拍视频| 欧美另类一区| 熟妇人妻久久中文字幕3abv| 一二三四中文在线观看免费高清| 精品国产露脸久久av麻豆 | 成人亚洲精品一区在线观看 | 最近最新中文字幕免费大全7| 国产高清三级在线| 国产一区二区亚洲精品在线观看| 日日摸夜夜添夜夜添av毛片| 久久97久久精品| 网址你懂的国产日韩在线| 欧美成人一区二区免费高清观看| 国产成人精品久久久久久| 国产精品久久久久久精品电影小说 | 一级爰片在线观看| 丰满乱子伦码专区| 不卡视频在线观看欧美| 亚洲婷婷狠狠爱综合网| 国内精品美女久久久久久| 乱系列少妇在线播放| 亚洲av中文av极速乱| 美女高潮的动态| 婷婷色综合大香蕉| 日韩欧美国产在线观看| 高清午夜精品一区二区三区| 最近手机中文字幕大全| ponron亚洲| 99热全是精品| 黄片wwwwww| av线在线观看网站| 亚洲18禁久久av| 国产在线男女| 日日干狠狠操夜夜爽| 欧美最新免费一区二区三区| 国产精品熟女久久久久浪| 在线观看av片永久免费下载| 成人二区视频| 国产成人91sexporn| 天堂网av新在线| 丰满乱子伦码专区| 成人高潮视频无遮挡免费网站| 国产免费视频播放在线视频 | 日韩亚洲欧美综合| 国产黄色免费在线视频| 欧美极品一区二区三区四区| 亚洲av免费在线观看| 国产伦精品一区二区三区四那| 我要看日韩黄色一级片| 国内精品一区二区在线观看| 欧美成人一区二区免费高清观看| 午夜福利网站1000一区二区三区| 麻豆精品久久久久久蜜桃| 久久精品国产自在天天线| 精品人妻一区二区三区麻豆| 色吧在线观看| 午夜免费男女啪啪视频观看| 欧美激情在线99| 插逼视频在线观看| 久99久视频精品免费| 亚洲自拍偷在线| av线在线观看网站| 精品久久久久久久久av| 国产探花极品一区二区| 一区二区三区免费毛片| 国产高潮美女av| 麻豆av噜噜一区二区三区| 亚洲欧洲国产日韩| 联通29元200g的流量卡| 观看美女的网站| 老司机影院毛片| 麻豆成人午夜福利视频| 亚洲国产精品sss在线观看| 日日啪夜夜爽| 欧美另类一区| 色综合色国产| 中文乱码字字幕精品一区二区三区 | 亚洲va在线va天堂va国产| 国产精品综合久久久久久久免费| 婷婷色av中文字幕| 精品欧美国产一区二区三| 亚洲精品乱码久久久久久按摩| a级毛色黄片| 成人国产麻豆网| 免费少妇av软件| 精品久久国产蜜桃| 日韩一区二区视频免费看| 国产成人福利小说| 亚洲三级黄色毛片| 丰满人妻一区二区三区视频av| 熟妇人妻不卡中文字幕| 日本色播在线视频| 亚洲一区高清亚洲精品| 国产极品天堂在线| 最近的中文字幕免费完整| 纵有疾风起免费观看全集完整版 | 国产色爽女视频免费观看| 菩萨蛮人人尽说江南好唐韦庄| 国产日韩欧美在线精品| 深爱激情五月婷婷| 夫妻性生交免费视频一级片| 久久精品夜色国产| 欧美bdsm另类| 免费人成在线观看视频色| 国产黄色小视频在线观看| 在线天堂最新版资源| 韩国av在线不卡| 亚洲怡红院男人天堂| 可以在线观看毛片的网站| 嫩草影院新地址| 全区人妻精品视频| 天堂俺去俺来也www色官网 | 国产v大片淫在线免费观看| 日韩大片免费观看网站| 亚洲无线观看免费| 午夜免费激情av| 国产av在哪里看| 高清在线视频一区二区三区| 91久久精品国产一区二区三区| 少妇熟女aⅴ在线视频| 亚洲av免费高清在线观看| 国产午夜精品久久久久久一区二区三区| 日日啪夜夜爽| 嫩草影院精品99| 色网站视频免费| 麻豆成人午夜福利视频| 26uuu在线亚洲综合色| 成人综合一区亚洲| av在线播放精品| 麻豆久久精品国产亚洲av| 国产v大片淫在线免费观看| av又黄又爽大尺度在线免费看| av在线亚洲专区| 精品久久久精品久久久| 2021天堂中文幕一二区在线观| 天堂影院成人在线观看| 欧美性感艳星| 夜夜看夜夜爽夜夜摸| 天堂俺去俺来也www色官网 | 熟妇人妻不卡中文字幕| 久久久久久久午夜电影| av福利片在线观看| 麻豆精品久久久久久蜜桃| 高清日韩中文字幕在线| 高清视频免费观看一区二区 | 国产精品国产三级专区第一集| av线在线观看网站| 嫩草影院精品99| 国产有黄有色有爽视频| 亚洲成人一二三区av| 国产精品一区二区三区四区久久| 少妇熟女aⅴ在线视频| 在线免费十八禁| 成人国产麻豆网| 欧美变态另类bdsm刘玥| 97热精品久久久久久| 日产精品乱码卡一卡2卡三| 乱码一卡2卡4卡精品| 超碰av人人做人人爽久久| 亚洲欧美一区二区三区黑人 | 五月玫瑰六月丁香| 国内精品一区二区在线观看| 熟女人妻精品中文字幕| 亚洲伊人久久精品综合| 亚洲无线观看免费| 男人和女人高潮做爰伦理| 3wmmmm亚洲av在线观看| 国产在线男女| 一区二区三区乱码不卡18| 日本与韩国留学比较| 国产日韩欧美在线精品| 69av精品久久久久久| 亚洲精品自拍成人| 国产大屁股一区二区在线视频| 少妇裸体淫交视频免费看高清| 三级国产精品欧美在线观看| 成人亚洲精品av一区二区| 色综合站精品国产| 国产av码专区亚洲av| 亚洲精品456在线播放app| 床上黄色一级片| 免费av不卡在线播放| 久久精品久久久久久久性| 亚洲18禁久久av| 国产成人精品福利久久| 三级毛片av免费| 美女黄网站色视频| 看免费成人av毛片| 午夜激情福利司机影院| 97超视频在线观看视频| 欧美激情久久久久久爽电影| 国产中年淑女户外野战色| 日日撸夜夜添| 搞女人的毛片| 国产精品美女特级片免费视频播放器| 久久久久久久久大av| 一个人看视频在线观看www免费| 老司机影院成人| 草草在线视频免费看| 免费看不卡的av| 国内精品宾馆在线| 日韩不卡一区二区三区视频在线| 中文资源天堂在线| 老司机影院成人| 日韩制服骚丝袜av| 熟妇人妻久久中文字幕3abv| 国产人妻一区二区三区在| 日日撸夜夜添| 看免费成人av毛片| 99热全是精品| 国产成人精品婷婷| 免费无遮挡裸体视频| 韩国高清视频一区二区三区| 国产国拍精品亚洲av在线观看| 国产一区二区三区综合在线观看 | 午夜精品在线福利| 免费播放大片免费观看视频在线观看| 午夜免费男女啪啪视频观看| 国内精品宾馆在线|